Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Singapore Management University

2012

Discipline
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 306

Full-Text Articles in Physical Sciences and Mathematics

Symbolic Model-Checking Of Stateful Timed Csp Using Bdd And Digitization, Truong Khanh Nguyen, Jun Sun, Yang Liu, Jin Song Dong Dec 2012

Symbolic Model-Checking Of Stateful Timed Csp Using Bdd And Digitization, Truong Khanh Nguyen, Jun Sun, Yang Liu, Jin Song Dong

Research Collection School Of Computing and Information Systems

Stateful Timed CSP has been recently proposed to model (and verify) hierarchical real-time systems. It is an expressive modeling language which combines data structure/operations, complicated control flows (modeled using compositional process operators adopted from Timed CSP), and real-time requirements like deadline and within. It has been shown that Stateful Timed CSP is equivalent to closed timed automata with silent transitions, which implies that the timing constraints of Stateful Timed CSP can be captured using explicit tick events, through digitization. In order to tackle the state space explosion problem, we develop a BDD-based symbolic model checking approach to verify Stateful Timed …


Finding Thoughtful Comments From Social Media, Gottipati Swapna, Jing Jiang Dec 2012

Finding Thoughtful Comments From Social Media, Gottipati Swapna, Jing Jiang

Research Collection School Of Computing and Information Systems

Online user comments contain valuable user opinions. Comments vary greatly in quality and detecting high quality comments is a subtask of opinion mining and summarization research. Finding attentive comments that provide some reasoning is highly valuable in understanding the user’s opinion particularly in sociopolitical opinion mining and aids policy makers, social organizations or government sectors in decision making. In this paper we study the problem of detecting thoughtful comments. We empirically study various textual features, discourse relations and relevance features to predict thoughtful comments. We use logistic regression model and test on the datasets related to sociopolitical content. We found …


Do Hackers Seek Variety? An Empirical Analysis Of Website Defacements, Kok Wei Ooi, Seung-Hyun Kim, Qiu-Hong Wang, Kai Lung Hui Dec 2012

Do Hackers Seek Variety? An Empirical Analysis Of Website Defacements, Kok Wei Ooi, Seung-Hyun Kim, Qiu-Hong Wang, Kai Lung Hui

Research Collection School Of Computing and Information Systems

The importance of securing the cyberspace is higher than ever along with the evolution of cyber attacks launched by hackers with malicious intention. However, there has been little research to understand the hackers who are the most important agents determining the landscape of information security. This paper investigates the behaviors of hackers using a longitudinal dataset of defacement attacks. Based on theories of economics of criminal behaviors and variety seeking, we find that hackers seek variety in choosing their victims in terms of region, hacking method, and the type of operating systems; as their prior experience is focused in terms …


Knowledge-Based Exploration For Reinforcement Learning In Self-Organizing Neural Networks, Teck-Hou Teng, Ah-Hwee Tan Dec 2012

Knowledge-Based Exploration For Reinforcement Learning In Self-Organizing Neural Networks, Teck-Hou Teng, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

Exploration is necessary during reinforcement learning to discover new solutions in a given problem space. Most reinforcement learning systems, however, adopt a simple strategy, by randomly selecting an action among all the available actions. This paper proposes a novel exploration strategy, known as Knowledge-based Exploration, for guiding the exploration of a family of self-organizing neural networks in reinforcement learning. Specifically, exploration is directed towards unexplored and favorable action choices while steering away from those negative action choices that are likely to fail. This is achieved by using the learned knowledge of the agent to identify prior action choices leading to …


Agent-Based Virtual Humans In Co-Space: An Evaluative Study, Yilin Kang, Ah-Hwee Tan, Fiona Fui-Hoon Nah Dec 2012

Agent-Based Virtual Humans In Co-Space: An Evaluative Study, Yilin Kang, Ah-Hwee Tan, Fiona Fui-Hoon Nah

Research Collection School Of Computing and Information Systems

Co-Space refers to interactive virtual environment modelled after the real world in terms of look-and-feel, functionalities and services. We have developed a 3D virtual world named Nan yang Technological University (NTU) Co-Space populated with virtual human characters. Three key requirements of realistic virtual humans in the virtual world have been identified, namely (1) autonomy: agents can function on their own, (2) interactivity: agents can interact naturally with players, and (3) personality: agents can exhibit human traits and characteristics. Working towards these challenges, we propose a brain-inspired agent architecture that integrates goal-directed autonomy, natural language interaction and human-like personality. We conducted …


Fame, Soft Flock Formation Control For Collective Behavior Studies And Rapid Games Development, Choon Sing Ho, Yew-Soon Ong, Xianshun Chen, Ah-Hwee Tan Dec 2012

Fame, Soft Flock Formation Control For Collective Behavior Studies And Rapid Games Development, Choon Sing Ho, Yew-Soon Ong, Xianshun Chen, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

We present FAME, a comprehensive C# software library package providing soft formation control for large flocks of agents. While many existing available libraries provide means to create flocks of agent equipped with simple steering behavior, none so far, to the best of our knowledge, provides an easy and hassle free approach to control the formation of the flock. Here, besides the basic flocking mechanisms, FAME provides an extensive range of advanced features that gives enhanced soft formation control over multiple flocks. These soft formation features include defining flocks in any user-defined formation, automated self-organizing agent within formation, manipulating formation shape …


An Extensible Framework For Selecting Incremental Innovations, Arcot Desai Narasimhalu Dec 2012

An Extensible Framework For Selecting Incremental Innovations, Arcot Desai Narasimhalu

Research Collection School Of Computing and Information Systems

There are several innovation methodologies reported in the literature starting from simple concepts such as technology push and market pull all the way to Disruptive innovation. Almost all these methods do not provide for customizability and extensibility. The method described in this paper is called Quick and Dirty Innovation Method or QaDIM in short to represent the fact that the method can be used rather easily to identify incremental innovation opportunities. The paper will first describe the basic concept, and then proceed to give a sample framework before proceeding to describe the extensibility. The method allows firms and individuals to …


On Recommending Hashtags In Twitter Networks, Su Mon Kywe, Tuan-Anh Hoang, Ee Peng Lim, Feida Zhu Dec 2012

On Recommending Hashtags In Twitter Networks, Su Mon Kywe, Tuan-Anh Hoang, Ee Peng Lim, Feida Zhu

Research Collection School Of Computing and Information Systems

Twitter network is currently overwhelmed by massive amount of tweets generated by its users. To effectively organize and search tweets, users have to depend on appropriate hashtags inserted into tweets. We begin our research on hashtags by first analyzing a Twitter dataset generated by more than 150,000 Singapore users over a three-month period. Among several interesting findings about hashtag usage by this user community, we have found a consistent and significant use of new hashtags on a daily basis. This suggests that most hashtags have very short life span. We further propose a novel hashtag recommendation method based on collaborative …


Detecting Anomalies In Bipartite Graphs With Mutual Dependency Principles, Hanbo Dai, Feida Zhu, Ee Peng Lim, Hwee Hwa Pang Dec 2012

Detecting Anomalies In Bipartite Graphs With Mutual Dependency Principles, Hanbo Dai, Feida Zhu, Ee Peng Lim, Hwee Hwa Pang

Research Collection School Of Computing and Information Systems

Bipartite graphs can model many real life applications including users-rating-products in online marketplaces, users-clicking-webpages on the World Wide Web and users referring users in social networks. In these graphs, the anomalousness of nodes in one partite often depends on that of their connected nodes in the other partite. Previous studies have shown that this dependency can be positive (the anomalousness of a node in one partite increases or decreases along with that of its connected nodes in the other partite) or negative (the anomalousness of a node in one partite rises or falls in opposite direction to that of its …


Reputation As Public Policy For Internet Security: A Field Study, Qian Tang, Leigh L. Linden, John S. Quarterman, Andrew Whinston Dec 2012

Reputation As Public Policy For Internet Security: A Field Study, Qian Tang, Leigh L. Linden, John S. Quarterman, Andrew Whinston

Research Collection School Of Computing and Information Systems

Cybersecurity is a national priority in this big data era. Because of the lack of incentives and the existence of negative externality, companies often underinvest in addressing security risks and accidents, despite government and industry recommendations. In the present article, we propose a method that utilizes reputation through information disclosure to motivate companies to behave pro-socially, improving their Internet security. Using outbound spam as a proxy for Internet security, we conducted a quasiexperimental field study for eight countries through SpamRankings.net. This outgoingspam-based study shows that information disclosure on outgoing spam can help reduce outgoing spam, approximately by 16 percent. This …


Community-Based Classification Of Noun Phrases In Twitter, Freddy Chong Tat Chua, William W. Cohen, Justin Betterridge, Ee-Peng Lim Dec 2012

Community-Based Classification Of Noun Phrases In Twitter, Freddy Chong Tat Chua, William W. Cohen, Justin Betterridge, Ee-Peng Lim

Research Collection School Of Computing and Information Systems

Many event monitoring systems rely on counting known keywords in streaming text data to detect sudden spikes in frequency. But the dynamic and conversational nature of Twitter makes it hard to select known keywords for monitoring. Here we consider a method of automatically finding noun phrases (NPs) as keywords for event monitoring in Twitter. Finding NPs has two aspects, identifying the boundaries for the subsequence of words which represent the NP, and classifying the NP to a specific broad category such as politics, sports, etc. To classify an NP, we define the feature vector for the NP using not just …


Lagrangian Relaxation For Large-Scale Multi-Agent Planning, Geoffrey J. Gordon, Pradeep Varakantham, William Yeoh, Hoong Chuin Lau, Ajay S. Aravamudhan, Shih-Fen Cheng Dec 2012

Lagrangian Relaxation For Large-Scale Multi-Agent Planning, Geoffrey J. Gordon, Pradeep Varakantham, William Yeoh, Hoong Chuin Lau, Ajay S. Aravamudhan, Shih-Fen Cheng

Research Collection School Of Computing and Information Systems

Multi-agent planning is a well-studied problem with various applications including disaster rescue, urban transportation and logistics, both for autonomous agents and for decision support to humans. Due to computational constraints, existing research typically focuses on one of two scenarios: unstructured domains with many agents where we are content with heuristic solutions, or domains with small numbers of agents or special structure where we can provide provably near-optimal solutions. By contrast, in this paper, we focus on providing provably near-optimal solutions for domains with large numbers of agents, by exploiting a common domain-general property: if individual agents each have limited influence …


Cross-Lingual Identification Of Ambiguous Discourse Connectives For Resource-Poor Language, Lanjun Zhou, Wei Gao, Binyang Li, Zhongyu Wei, Kam-Fai Wong Dec 2012

Cross-Lingual Identification Of Ambiguous Discourse Connectives For Resource-Poor Language, Lanjun Zhou, Wei Gao, Binyang Li, Zhongyu Wei, Kam-Fai Wong

Research Collection School Of Computing and Information Systems

The lack of annotated corpora brings limitations in research of discourse classification for many languages. In this paper, we present the first effort towards recognizing ambiguities of discourse connectives, which is fundamental to discourse classification for resource-poor language such as Chinese. A language independent framework is proposed utilizing bilingual dictionaries, Penn Discourse Treebank and parallel data between English and Chinese. We start from translating the English connectives to Chinese using a bi-lingual dictionary. Then, the ambiguities in terms of senses a connective may signal are estimated based on the ambiguities of English connectives and word alignment information. Finally, the ambiguity …


Investigating Intelligent Agents In A 3d Virtual World, Yilin Kang, Fiona Fui-Hoon Nah, Ah-Hwee Tan Dec 2012

Investigating Intelligent Agents In A 3d Virtual World, Yilin Kang, Fiona Fui-Hoon Nah, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

Web 3.0 involves "intelligent" web applications that utilize natural language processing, machine-based learning and reasoning, and intelligent techniques to analyze and understand user behavior. In this research, we empirically assess a specific form of Web 3.0 application in the form of intelligent agents that offer assistance to users in the virtual world. Using media naturalness theory, we hypothesize that the use of intelligent agents in the virtual world can enhance user experience by offering a more natural way of communication and assistance to users. We are interested to test if media naturalness theory holds in the context of intelligent agents …


Diffusion Of Software Features: An Exploratory Study, Ferdian Thung, David Lo, Lingxiao Jiang Dec 2012

Diffusion Of Software Features: An Exploratory Study, Ferdian Thung, David Lo, Lingxiao Jiang

Research Collection School Of Computing and Information Systems

New features are frequently proposed in many software libraries. These features include new methods, classes, packages, etc. These features are utilized in many open source and commercial software systems. Some of these features are adopted very quickly, while others take a long time to be adopted. Each feature takes much resource to develop, test, and document. Library developers and managers need to decide what feature to prioritize and what to develop next. As a first step to aid these stakeholders, we perform an exploratory study on the diffusion or rate of adoption of features in Java Development Kit (JDK) library. …


Cost-Sensitive Online Classification, Jialei Wang, Peilin Zhao, Steven C. H. Hoi Dec 2012

Cost-Sensitive Online Classification, Jialei Wang, Peilin Zhao, Steven C. H. Hoi

Research Collection School Of Computing and Information Systems

Both cost-sensitive classification and online learning have been extensively studied in data mining and machine learning communities, respectively. However, very limited study addresses an important intersecting problem, that is, “Cost-Sensitive Online Classification". In this paper, we formally study this problem, and propose a new framework for Cost-Sensitive Online Classification by directly optimizing cost-sensitive measures using online gradient descent techniques. Specifically, we propose two novel cost-sensitive online classification algorithms, which are designed to directly optimize two well-known cost-sensitive measures: (i) maximization of weighted sum of sensitivity and specificity, and (ii) minimization of weighted misclassification cost. We analyze the theoretical bounds of …


Structural And Functional Analysis Of Multi-Interface Domains, Liang Zhao, Steven C. H. Hoi, Limsoon Wong, Tobias Hamp, Jinyan Li Dec 2012

Structural And Functional Analysis Of Multi-Interface Domains, Liang Zhao, Steven C. H. Hoi, Limsoon Wong, Tobias Hamp, Jinyan Li

Research Collection School Of Computing and Information Systems

A multi-interface domain is a domain that can shape multiple and distinctive binding sites to contact with many other domains, forming a hub in domain-domain interaction networks. The functions played by the multiple interfaces are usually different, but there is no strict bijection between the functions and interfaces as some subsets of the interfaces play the same function. This work applies graph theory and algorithms to discover fingerprints for the multiple interfaces of a domain and to establish associations between the interfaces and functions, based on a huge set of multi-interface proteins from PDB. We found that about 40% of …


Visualization For Anomaly Detection And Data Management By Leveraging Network, Sensor And Gis Techniques, Zhaoxia Wang, Chee Seng Chong, Rick S. M. Goh, Wanqing Zhou, Dan Peng, Hoong Chor Chin Dec 2012

Visualization For Anomaly Detection And Data Management By Leveraging Network, Sensor And Gis Techniques, Zhaoxia Wang, Chee Seng Chong, Rick S. M. Goh, Wanqing Zhou, Dan Peng, Hoong Chor Chin

Research Collection School Of Computing and Information Systems

This paper studies the importance of visualization for discerning and interpreting patterns of data and its application for solving real problems, such as anomaly detection and data management. There are various ways to realize visualization to cater to the needs of numerous real life applications. Depending on needs, a combination of some of these ways may be required for presenting an effective visualization. The authors present visualization schemes for anomaly detection/condition monitoring and data management by leveraging network techniques and combining them with modern techniques such as sensor, database, mobile communication, GPS and GIS techniques. Two case studies are presented …


Eliciting Usable Gestures For Multi-Display Environments, Teddy Seyed, Chris Burns, Mario Costa Sousa, Frank Maurer, Anthony Tang Dec 2012

Eliciting Usable Gestures For Multi-Display Environments, Teddy Seyed, Chris Burns, Mario Costa Sousa, Frank Maurer, Anthony Tang

Research Collection School Of Computing and Information Systems

Multi-display environments (MDEs) have advanced rapidly in recent years, incorporating multi-touch tabletops, tablets, wall displays and even position tracking systems. Designers have proposed a variety of interesting gestures for use in an MDE, some of which involve a user moving their hands, arms, body or even a device itself. These gestures are often used as part of interactions to move data between the various components of an MDE, which is a longstanding research problem. But designers, not users, have created most of these gestures and concerns over implementation issues such as recognition may have influenced their design. We performed a …


A Mechanism For Organizing Last-Mile Service Using Non-Dedicated Fleet, Shih-Fen Cheng, Duc Thien Nguyen, Hoong Chuin Lau Dec 2012

A Mechanism For Organizing Last-Mile Service Using Non-Dedicated Fleet, Shih-Fen Cheng, Duc Thien Nguyen, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

Unprecedented pace of urbanization and rising income levels have fueled the growth of car ownership in almost all newly formed megacities. Such growth has congested the limited road space and significantly affected the quality of life in these megacities. Convincing residents to give up their cars and use public transport is the most effective way in reducing congestion; however, even with sufficient public transport capacity, the lack of last-mile (from the transport hub to the destination) travel services is the major deterrent for the adoption of public transport. Due to the dynamic nature of such travel demands, fixed-size fleets will …


A Survey Of Recommender Systems In Twitter, Su Mon Kywe, Ee Peng Lim, Feida Zhu Dec 2012

A Survey Of Recommender Systems In Twitter, Su Mon Kywe, Ee Peng Lim, Feida Zhu

Research Collection School Of Computing and Information Systems

Twitter is a social information network where short messages or tweets are shared among a large number of users through a very simple messaging mechanism. With a population of more than 100M users generating more than 300M tweets each day, Twitter users can be easily overwhelmed by the massive amount of information available and the huge number of people they can interact with. To overcome the above information overload problem, recommender systems can be introduced to help users make the appropriate selection. Researchers have began to study recommendation problems in Twitter but their works usually address individual recommendation tasks. There …


An Automated Pathological Class Level Annotation System For Volumetric Brain Images, Thien Anh Dinh, Tomi Silander, C. C. Tchoyoson Lim, Tze-Yun Leong Dec 2012

An Automated Pathological Class Level Annotation System For Volumetric Brain Images, Thien Anh Dinh, Tomi Silander, C. C. Tchoyoson Lim, Tze-Yun Leong

Research Collection School Of Computing and Information Systems

We introduce an automated, pathological class level annotation system for medical volumetric brain images. While much of the earlier work has mainly focused on annotating regions of interest in medical images, our system does not require annotated region level training data nor assumes perfect segmentation results for the regions of interest; the time and effort needed for acquiring training data are hence significantly reduced. This capability of handling high-dimensional noisy data, however, poses additional technical challenges, since statistical estimation of models for such data is prone to over-fitting. We propose a framework that combines a regularized logistic regression method and …


Knowledge-Driven Autonomous Commodity Trading Advisor, Yee Pin Lim, Shih-Fen Cheng Dec 2012

Knowledge-Driven Autonomous Commodity Trading Advisor, Yee Pin Lim, Shih-Fen Cheng

Research Collection School Of Computing and Information Systems

The myth that financial trading is an art has been mostly destroyed in the recent decade due to the proliferation of algorithmic trading. In equity markets, algorithmic trading has already bypass human traders in terms of traded volume. This trend seems to be irreversible, and other asset classes are also quickly becoming dominated by the machine traders. However, for asset that requires deeper understanding of physicality, like the trading of commodities, human traders still have significant edge over machines. The primary advantage of human traders in such market is the qualitative expert knowledge that requires traders to consider not just …


Use Of Rss Feeds To Push The Online Content To Users, Dan Ma Dec 2012

Use Of Rss Feeds To Push The Online Content To Users, Dan Ma

Research Collection School Of Computing and Information Systems

Many websites use Really Simple Syndication (RSS) feeds to actively push their online content to users rather than waiting for users to pull the content passively. In this paper, I construct a theoretical game model to study the profitability of an RSS-PUSH delivery mechanism. The model assumes a general profit structure for websites and heterogeneous users. To access valuable online content, users incur a variety of costs. They choose either to visit the website in the conventional way (the PULL model) or, if it is supported by the website, to use RSS (the PUSH model). Interestingly, I show that although …


Ibinhunt: Binary Hunting With Inter-Procedural Control Flow, Jiang Ming, Meng Pan, Debin Gao Dec 2012

Ibinhunt: Binary Hunting With Inter-Procedural Control Flow, Jiang Ming, Meng Pan, Debin Gao

Research Collection School Of Computing and Information Systems

Techniques have been proposed to find the semantic differences between two binary programs when the source code is not available. Analyzing control flow, and in particular, intra-procedural control flow, has become an attractive technique in the latest binary diffing tools since it is more resistant to syntactic, but non-semantic, differences. However, this makes such techniques vulnerable to simple function obfuscation techniques (e.g., function inlining) attackers any malware writers could use. In this paper, we first show function obfuscation as an attack to such binary diffing techniques, and then propose iBinHunt which uses deep taint and automatic input generation to find …


Extracting And Normalizing Entity-Actions From Users' Comments, Swapna Gottipati, Jing Jiang Dec 2012

Extracting And Normalizing Entity-Actions From Users' Comments, Swapna Gottipati, Jing Jiang

Research Collection School Of Computing and Information Systems

With the growing popularity of opinion-rich resources on the Web, new opportunities and challenges arise and aid people in actively using such information to understand the opinions of others. Opinion mining process currently focuses on extracting the sentiments of the users on products, social, political and economical issues. In many instances, users not only express their sentiments but also contribute their ideas, requests and suggestions through comments. Such comments are useful for domain experts and are referred to as actionable content. Extracting actionable knowledge from online social media has attracted a growing interest from both academia and the industry. We …


B-Cell Epitope Prediction Through A Graph Model, Liang Zhao, Limsoon Wong, Lanyuan Lu, Steven C. H. Hoi, Jinyan Li Dec 2012

B-Cell Epitope Prediction Through A Graph Model, Liang Zhao, Limsoon Wong, Lanyuan Lu, Steven C. H. Hoi, Jinyan Li

Research Collection School Of Computing and Information Systems

Prediction of B-cell epitopes from antigens is useful to understand the immune basis of antibody-antigen recognition, and is helpful in vaccine design and drug development. Tremendous efforts have been devoted to this long-studied problem, however, existing methods have at least two common limitations. One is that they only favor prediction of those epitopes with protrusive conformations, but show poor performance in dealing with planar epitopes. The other limit is that they predict all of the antigenic residues of an antigen as belonging to one single epitope even when multiple non-overlapping epitopes of an antigen exist.


Lagrangian Relaxation For Large-Scale Multi-Agent Planning, Geoff Gordon, Pradeep Varakantham, William Yeoh, Hoong Chuin Lau, Shih-Fen Cheng Dec 2012

Lagrangian Relaxation For Large-Scale Multi-Agent Planning, Geoff Gordon, Pradeep Varakantham, William Yeoh, Hoong Chuin Lau, Shih-Fen Cheng

Research Collection School Of Computing and Information Systems

Multi-agent planning is a well-studied problem with various applications including disaster rescue, urban transportation and logistics, both for autonomous agents and for decision support to humans. Due to computational constraints, existing research typically focuses on one of two scenarios: unstructured domains with many agents where we are content with heuristic solutions, or domains with small numbers of agents or special structure where we can provide provably near-optimal solutions. By contrast, in this paper, we focus on providing provably near-optimal solutions for domains with large numbers of agents, by exploiting a common domain-general property: if individual agents each have limited influence …


Semi-Automated Verification Of Defense Against Sql Injection In Web Applications, Kaiping Liu, Hee Beng Kuan Tan, Lwin Khin Shar Dec 2012

Semi-Automated Verification Of Defense Against Sql Injection In Web Applications, Kaiping Liu, Hee Beng Kuan Tan, Lwin Khin Shar

Research Collection School Of Computing and Information Systems

Recent reports reveal that majority of the attacks to Web applications are input manipulation attacks. Among these attacks, SQL injection attack malicious input is submitted to manipulate the database in a way that was unintended by the applications' developers is one such attack. This paper proposes an approach for assisting to code verification process on the defense against SQL injection. The approach extracts all such defenses implemented in code. With the use of the proposed approach, developers, testers or auditors can then check the defenses extracted from code to verify their adequacy. We have evaluated the feasibility, effectiveness, and usefulness …


Creating The Park Cool Island In An Inner-City Neighborhood: Heat Mitigation Strategy For Phoenix, Az, Juan Declet-Barreto, Anthony J. Brazel, Chris A. Martin, Winston T. L. Chow, Sharon L. Harlan Dec 2012

Creating The Park Cool Island In An Inner-City Neighborhood: Heat Mitigation Strategy For Phoenix, Az, Juan Declet-Barreto, Anthony J. Brazel, Chris A. Martin, Winston T. L. Chow, Sharon L. Harlan

Research Collection School of Social Sciences

We conducted microclimate simulations in ENVI-Met 3.1 to evaluate the impact of vegetation in lowering temperatures during an extreme heat event in an urban core neighborhood park in Phoenix, Arizona. We predicted air and surface temperatures under two different vegetation regimes: existing conditions representative of Phoenix urban core neighborhoods, and a proposed scenario informed by principles of landscape design and architecture and Urban Heat Island mitigation strategies. We found significant potential air and surface temperature reductions between representative and proposed vegetation scenarios: 1) a Park Cool Island effect that extended to non-vegetated surfaces; 2) a net cooling of air underneath …